Download presentation
Presentation is loading. Please wait.
Published byLeonard Matthews Modified over 8 years ago
2
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning Ping often is blocked by firewalls Send TCP SYN/ACK to generate RST segments (Figure 4-8) These are carried in IP packets that reveal the potential victim’s IP address Other RST-generating attacks (SYN/FIN segments)
3
2 Figure 4-8: TCP SYN/ACK Host Scanning Attack
4
3 Figure 4-1: Targeted System Penetration (Break-In Attacks) Network Scanning To learn about router organization in a network Send Traceroute messages (Tracert in Windows systems) Port Scanning Most break-ins exploit specific services For instance, IIS webservers Services listen for connections on specific TCP or UDP ports (HTTP=80)
5
4 Figure 4-1: Targeted System Penetration (Break-In Attacks) Port Scanning Scan servers for open ports (Figure 4-9) Send SYN segments to a particular port number Observe SYN/ACK or reset (RST) responses May scan for all well-known TCP ports (1024) and all well- known UDP ports (1024) Or may scan more selectively Scan clients for Windows file sharing ports (135-139) Stealth scanning Scan fewer systems and ports and/or scan more slowly to avoid detection
6
5 Figure 4-1: Targeted System Penetration (Break-In Attacks) Fingerprinting Identify a particular operating system or application program and (if possible) version For example, Microsoft Windows 2000 Server For example, BSD LINUX 4.2 For example, Microsoft IIS 5.0 Useful because most exploits are specific to particular programs or versions
7
6 Figure 4-1: Targeted System Penetration (Break-In Attacks) Fingerprinting Active fingerprinting Send odd messages and observe replies Different operating systems and application programs respond differently Odd packets may set off alarms
8
7 Figure 4-1: Targeted System Penetration (Break-In Attacks) Fingerprinting Passive fingerprinting Read packets and look at parameters (TTL, window size, etc.) If TTL is 113, probably originally 128. Windows 9X, NT 4.0, 2000, or Novell NetWare Window size field is 18,000. Must be Windows 2000 Server Less precise than active fingerprinting
9
8 Figure 4-9: NMAP Port Scanning and Operating Systems Fingerprinting
10
9 Figure 4-1: Targeted System Penetration (Break-In Attacks) The Break-In Password Guessing Seldom works because attacker is locked our after a few guesses Exploits that take advantage of known vulnerabilities that have not been patched Exploits are easy to use Frequently effective The most common break-in approach today Session hijacking (Figure 4-10) Take over an existing TCP communication session Difficult to do (must guess TCP sequence numbers), so not commonly done
11
10 Figure 4-10: Session Hijacking
12
11 Figure 4-1: Targeted System Penetration (Break-In Attacks) After the Break-In Install rootkit Usually downloaded through trivial file transfer protocol (TFTP) Erase audit logs Create backdoors for reentry if original hacking vulnerability is fixed Backdoor accounts Trojanized programs that permit reentry
13
12 Figure 4-1: Targeted System Penetration (Break-In Attacks) After the Break-In Weaken security Unfettered access to steal information Install victimization software Keystroke capture programs Spyware Remote Administration Trojans (RATs) Attack software to use against other hosts
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.